March 19, 1998
Cyberspace, Sovereignty, Jurisdiction and Modernism
Joel P. Trachtman(1)
While reports of history's end have proven premature,(3)
and the state will not readily wither away,(4) the state is
historically contingent and the powers of the state that we refer to as
"sovereignty" have never been static. Technological advances, such as the
development of cyberspace, give rise to new means of expression of our
aspirations, including new allocations of power both to the state and to
non-state entities. International law is the vehicle for revision of these
allocations of power. This is not a reference to the new medievalism,(5)
which argues for its own simplified order without government, but rather
a pragmatic and practically trivial reference to the inevitability of change,
both technological and institutional. The argument that technological changes
occurring today require the death of the state and its regulatory function
proves too much. It is not the state that has died, but the long-moribund
theory of absolute territorial sovereignty.
Nor does this essay refer to Anne-Marie Slaughter's transgovernmentalism,
which might be viewed as a kind of extended multimedia intergovernmentalism
(but not as the pooled authority of transnationalism), and which seems
to contemplate a static allocation of powers to the state combined with
new, decentralized, means for the state to interact with other states.
While the phenomenon of increased "transgovernmentalism" certainly exists,
and competes with transnationalism and more traditional intergovernmental
international relations, transgovernmentalism is more an observation about
the way states organize themselves for international relations than either
an observation about the powers of the state itself, or the international
legal order. Slaughter's transgovernmentalism is a related phenomenon regarding
the distribution of powers to engage in international relations within
the state. This essay calls for a recognition of institutional contingency,
applicable to all institutions including the state, and suggests how the
rise of cyberspace may affect the institution known as the state, both
in reality and in our theoretical perception.(6)
In this brief essay, which reflects upon Dean Henry Perritt's thoughtful
evaluation of the relationship between technology and sovereignty,(7)
I depict the problem of sovereignty as a problem of institutional competence.
The theoretical background of this perspective is the new institutional
economics and law and economics. The relationship that I explore is that
between the technical production frontier and the structural production
frontier.(8) These are the two components of the frontier of
Pareto efficiency. In short, the technical production frontier is set by
our technological capabilities, while the structural production frontier
is set by our institutional capabilities. Lawyers, at their best, work
to expand the structural production frontier.
Sovereignty is often objectionable when it is used as a conclusory epithet
in discussions of the power of the state (I will refer to this meaning
of sovereignty as "conclusory sovereignty"). This is the type of sovereignty
about which Prof. Henkin is correct to exclaim, "away with the 'S' word."(9)
Its natural law assumption of fixed, complete and unassailable sovereignty
has never been correct and is not correct today. It is surprising that
this type of sovereignty has become a tenet of realist political scientists,
and is often accepted also by positivist international lawyers. It is surprising
because realists and positivists purport to be empiricists, and only a
self-deceptive empiricist could find that conclusory sovereignty comports
with the facts of our world. Realists and positivists would be embarrassed
to find that it is they who are guilty of normative thinking, arguing that
states "should" be accorded plenary sovereignty.(10) Nor are
the idealists and natural law theorists correct in the normative assertion
that authority "should" be transferred to a world federalist government.
Rather, the correct allocation of authority is dynamic, complex and contingent.
However, as will be seen below, there is a place in the world for conclusory
sovereignty.
Since before the Treaty of Westphalia, the powers of the state have
been contingent, and must continue to be allowed to respond to changes
in our goals and changes in our means of achieving those goals. New technologies
change our means of achieving our goals, both technically and structurally.
Sovereignty is both inescapable and welcome, when it is used to refer to
the powers we decide to assign the state (this type of sovereignty is referred
to as "contingent sovereignty"). As mentioned above, international law
is the sculptor's tool in the hand of world history, constantly shaping
and reshaping the state and other institutions. Of course, the state is
also shaped and re-shaped by its own law--by domestic law. It is in this
sense that international law and domestic law are joined in a single project
of social design.
Conclusory sovereignty is a zombie that has always been dead in fact,
and lived only for a brief moment if at all, but haunts and perturbs our
discourse, allowing unconsidered assertions of state power where state
power is inappropriate and power is better dispersed to smaller units or
to people, or assigned to larger units. We will not mourn the final burial
of conclusory sovereignty; in fact, we should drive a stake through its
heart by shunning its use in rational discourse.(11) On the
other hand, contingent sovereignty--the group of powers society decides
to assign to the state at any given moment and in any given circumstance--is
important and, once determined, worthy of defense. That is, where it is
the legitimate expression of people's aspirations, contingent sovereignty
deserves respect. Contingent sovereignty, and the respect for community
decisions it entails, is worthy of protection as a type of procedural justice
based on liberal theory. It is in this way that we can ethically defend
the sovereignty of a state that, in our view, may take actions that we
find ethically objectionable. This liberal moral relativism is what allows
us to live at peace in a world where individuals hold varied moral tenets.
Very often, the debate over cyberspace and sovereignty wrongly assumes
that cyberspace attacks sovereignty. Here, Perritt is right to argue that
cyberspace may be sovereignty-preserving, and my analysis below supports
his project. However, I would add that cyberspace is neither clearly sovereignty-demeaning
nor clearly sovereignty-preserving: cyberspace today is neutral in the
contention over the powers of the state. Those who purport to tell us whether
cyberspace will, in the course of time, demean or enhance the powers of
the state must fail, as this question cannot be answered in general or
in advance, but must be answered as we evaluate and build particular institutions
over time. In fact, our best hope is that it will be citizens, not scholars,
who, by their political acts, will indicate when and how contingent sovereignty
will change. The role of scholars, and lawyers, is to help citizens to
imagine, evaluate, structure and implement changes.(12)
Cyberspace is best viewed as a bulge in the technical production frontier.
Our institutions, including contingent sovereignty, determine the extent
to which we reach the limits of the technical production frontier. In addition,
and more saliently, changes in the technical production frontier, especially
in communications, modify the structural production frontier. They do so
by modifying the transaction costs of different institutional structures.
This means that not only does cyberspace facilitate private activity, but,
as Perritt points out, it also facilitates government activity. Not only
does technology strengthen the tools of government, but it can also strengthen
the legitimacy of government through heightened transparency and democracy.
Furthermore, these technological changes affect the costs of achieving
our preferences. Change in the cost of achieving preferences will differentially
affect the extent to which we may satisfy some preferences, and, more importantly,
will affect the means used to achieve our preferences. This includes the
question of whether we use the market or the state to achieve certain goals.
We cannot predict the answer to this question simply by referring to cyberspace.
Rather, the answer to the market versus state question is dependent upon
the confluence of a complex set of variables. Even if all variables other
than the development of cyberspace were held constant, the development
of cyberspace itself includes several variables, perhaps contradicting
one another,(13) which must be evaluated separately before being
aggregated to form an answer.
How does cyberspace affect the relationship between individual sovereignty
and state sovereignty? Certainly bi-directional communications are made
more efficient, and therefore more frequent. Individuals may provide more
information regarding their preferences to government, through referenda,
surveys or market-mimicking mechanisms such as electronic highway toll
collection. This information revelation function may serve to legitimate
government action: it can be more strongly rooted in citizen preferences.
On the other hand, as Perritt quotes Wriston, information technology "enables
the citizen to watch Big Brother."(15) The citizen can keep
better track of government, and thereby provide enhanced input as to the
citizen's preferences. This revolution in availability of information risks
overwhelming the citizen: representative democracy has roots in efficiency.
When Perritt argues that cyberspace strengthens sovereignty from the perspective
of liberal theory,(16) he must mean that cyberspace strengthens
the expression of individual preferences in the sense described here.
Finally, it does not appear particularly useful to speak, as Reidenberg
does, of the "sovereignty" of internet network systems.(17)
While the substantive point regarding the relative capacity and need for
autonomy of such networks may, like the similar point regarding private
corporations, be accurate, reference to powers similar to those accorded
to states by conclusory sovereignty simply clouds the analysis by treating
unlike things alike.
In fact, however, territoriality is the constraint that unravels the
assertion of unconstrained state power.(19) The myth of unconstrained
state power fails horizontally, because territoriality constrains it. Furthermore,
the territoriality constraint is radically indeterminate. Conflict of laws
scholars have known, since the legal realist attack on the vested rights
theory, led by Walter Wheeler Cook in the 1930's and 1940's,(20)
that simple assertions of territoriality often fail to answer questions
of allocation of power.(21) The assertion of unconstrained state
power also fails vertically, because states agree, at least, on the existence
of international law, including the international law rule that vertically
limits each state's horizontal assertion of power on bases related to territory.(22)
The real jurisdictional novelty of cyberspace is that it will give rise
to more frequent circumstances in which effects are felt in multiple territories
at once. I find this development welcome from a theoretical standpoint
because it finally makes apparent what was true all along, long before
the development of cyberspace: effects are rarely neatly cabined within
particular jurisdictions. Therefore, the allocation of jurisdiction to
a particular state necessarily involves distributional or political choices,
and is not simply a technical issue. Thus, for me, the development of cyberspace
frees us to think more clearly about problems of jurisdiction, but does
not itself raise new problems. However, as will be seen, the old problems
are difficult enough. In fact, one way of viewing the rise of cyberspace
is as a phenomenon that accentuates the old problems to a point where it
is worthwhile to us finally to devise a more substantial institutional
solution. Furthermore, while cyberspace accentuates the old problems, it
also provides intriguing new potential solutions.
Prescription 1. The first prescription argues that given that
cyberspace cannot be neatly cabined in any single territory, and assuming
that territoriality is the only basis for jurisdiction, no state should
regulate cyberspace.(28) This argument is obviously non-sequacious.
Furthermore, it proves too much. Nothing can be neatly cabined in any single
territory. If we throw up our regulatory hands simply because we cannot
establish territorial categories, the result would be anarchy. While this
may be congruent with the new medievalism, and with the Chicago school
(and socialist) vision of the state, many of us still see a role for government.
Prescription 2. The second prescription, based on the same factual
predicates, argues for global government. This global government may be
described on three parameters. On the first parameter, it may have rules
for allocation of jurisdiction among governments. On the second parameter,
it may harmonize rules. On the third parameter, it may create centralized
organizations to engage in rulemaking and enforcement activities. Like
the first prescription, the second is a non-sequitur: the failure of territoriality
indicates neither anarchy nor global government.
It is my contention that these two opposing choices are insufficient.
It is obvious that everything is not for the market, as it is obvious that
everything is not for international governance, just as it is conversely
obvious that everything is not for the state. However, some things are
bound to remain for the state, while some things are for the market and
other things are for international governance. This is the true meaning
of subsidiarity, and it leaves us in the existential position of having
to analyze and choose, rather than being able to conclude debates by simple
epithets.
For now, it is enough simply to dissent from the modernist approach
to regulatory jurisdiction that holds that cyberspace presents jurisdictional
challenges unseen before. There have never been many issues that one country
can completely deal with on its own: cyberspace simply accelerates the
realization of this fact. The development of cyberspace will only change
our jurisdictional lives incrementally, and should not be viewed as a revolution
that marks radical changes in our legal relationships. Nor should the development
of cyberspace be viewed as a basis for either allocation of all social
decisions to the market, or allocation of all social decisions to international
governance. Below, we discuss the complex and contingent problem of discriminating
among these choices in particular circumstances.
Finally, I see more possibilities than Perritt does for cooperation
among states to establish rules of prescriptive jurisdiction, harmonization
of law and international organizations to apply these rules. Many recent
initiatives in international regulation and in the trade arena have done
exactly this. I also see possibilities for new laissez-faire regimes, or
spaces, in cyberspace, but do not understand why one would argue, as Johnson
and Post do, that all of cyberspace should be free of state-bound law.(29)
Coase developed the theory of the firm(30) to analyze why
firms exist, and if they should exist, why there is not just one all-encompassing
firm. If we think of the state or an international organization as simply
a bigger version of a firm, it becomes apparent that Coase's theory of
the firm is equally applicable to the state and to the international organization.(31)
Coase explored the dichotomy between transactions in the market and
allocational decisions within the firm. This dichotomy may be understood
as a kind of institutional choice: which structure is better to allow people
to produce more of what they want? The institutional choice may, however,
be broadened to include not only the market and the firm, but also the
state.(32) I have also proposed the further extension of this
choice to the international organization. Thus, institutional choice may
begin with a determination of whether the particular issue is best addressed
by the market, the firm, the state or an international organization. Of
course, this is only the beginning of analysis, as there are many variations
in the size, structure and governance of each of these types of entity.
Moreover, these structures always coexist and interrelate in subtle and
complex ways.
Coase postulated that the choice of structure is based on transaction
costs, and Williamson has taken up this argument.(33) It is
critical to recognize that transaction costs can only be determinative
if transaction gains and losses are otherwise equal; however, they almost
never can be held equal. Therefore, the choice of institutional structure
will be determined so as to maximize the positive sum of transaction gains,
transaction losses and transaction costs. The choice of a particular institutional
structure, such as the regulation of securities transactions, will be dependent
upon the broader institutional context. By the broader institutional context,
I mean the kinds of business structures, regulatory structures, courts
and international organizations already existing. Therefore, the maximization
process is subject to path dependency, and is like the work of a ship's
carpenter, who replaces a plank at a time, ensuring that each plank fits
into its place in the vessel, and over time replaces the entire ship.(34)
Finally, this maximization process is subordinate to the question of what
is to be maximized. Methodological individualism indicates that individual
preference is the value to be maximized.
First, cyberspace may tend to convert information from a private good
to a public good. In economic theory, public goods are goods that are characterized
by two characteristics: non-rivalry and non-excludability of consumption.(38)
Non-rivalry means that one person's consumption does not diminish the amount
available to others. While servers lack truly unlimited capacity, and America
Online subscribers during certain periods may well disagree, information
in cyberspace is largely characterized by non-rivalrous consumption. Non-excludability
refers to the relative ease or difficulty of preventing consumption by
those who do not pay for the resource. Cyberspace is currently struggling
with this problem, which is itself a transaction costs problem: what is
the cost of excluding non-payers?(39) Thus, while the analysis
is neither complete nor conclusive, cyberspace tends to convert information
from a private good to a public good. On the other hand, for those who
have followed the battles over intellectual property rights in international
trade, it is clear that even information that is ordinarily distributed
in physical form already has public goods characteristics. Simply put,
the rise of cyberspace seems to accentuate these characteristics.
Second, cyberspace makes the exchange of information faster and cheaper.
This is the reason for the rise of commerce on the internet: both commerce
in physical goods and commerce in information goods. These technological
advances are growing geometrically, and as enterprises realize their utility,
and establish network externalities by exploiting their utility in greater
numbers, they will substantially decrease the cost of transacting. This
decrease in the cost of transacting will have the effect of increasing
the number of transactions effected.
Third, not only will information flow more cheaply to the customer,
or to the purchaser at wholesale of goods or services. In addition, information
will flow more cheaply in both directions, enabling information also to
flow more cheaply from the purchaser to the seller. This will give rise
to new forms of targeted advertising, as well as targeted product development.
Finally, and critically for our topic, if one thinks of government as
a provider of goods and services,(40) then there is no reason
that government cannot have the same transaction cost reduction benefits
enjoyed by the private sector. This observation supports Perritt's insight
that government functions can be enhanced by cyberspace. As Wriston says
(and Perritt quotes), not only can Big Brother watch us, but we can watch
Big Brother, and communicate with one another. The theoretical core of
this idea, and its possible extension, is that enhanced communication can
allow citizens more easily to coordinate autonomously, without the intercession
of formal governance. The citizenry may more readily organize spontaneously
to supervise government, and thereby effectively displace government as
an independent decision-maker. This is a fundamental change, and will be
discussed further in part 5 below. However, let us note here that this
story is incomplete, for, while the transaction costs of spontaneous governance
may be diminished, the strategic problems that may prevent spontaneous
governance may actually be increased. That is, with reduced transaction
costs, the cost of holdout-type conduct--and the collective action problem--may
be increased.
Thus, cyberspace is a technical production frontier development that
has dramatically reduced the transaction costs of coordination in both
the private sector and the public sector.
On the structural production frontier, we create institutions to facilitate
social relations: to maximize the sum of gains from social relations, losses
from social relations and costs of social relations.(41) In
a market context, we refer to many types of social relations as transactions,
and indeed the "transaction" is the basic unit of institutional economics
analysis. The choice of institutions is determined by choosing the structure
that maximizes social gain.(42) If the rise of cyberspace differentially
reduces the transaction costs implicated by various institutional structures,
then it will affect the choice of institutional structure.
However, the suggestion that the rise of cyberspace will result in a
victory of the market over the state, or of the international organization
over the state, or of the state over either of the others, makes an unwarranted
assumption about the transaction cost profiles of the relevant institutions.
Rather, to take an extreme example (and one to which I do not personally
adhere), it might be that empirical investigation shows that cyberspace
does not empower the market much, but has finally provided the kind of
dense information exchange network that will allow socialism--state control
of most economic activity--finally to flourish. While we may not agree
that the age of cyberspace is the age of socialism, we may not be ready
to accept the opposite argument: that the age of cyberspace is the age
of the death of the state.
Rather, particularism still rules. Although the world has changed, and
transaction costs have been reduced, the world has never stopped changing,
and transaction costs have generally been reduced continuously throughout
history. We know that social relations--transactions--have become less
costly, and so we can expect them to become more dense: more frequent and
more complex. This is why property rights are more complex and disputes
more frequent than in the past. This is why international relations is
more complex and varied. Slaughter is correct to observe that governments
relate through many means on many levels, to a greater extent than in the
past. Her picture is incomplete without also recognizing that the private
sector now relates across borders more extensively, and business-government
relations in cross-border enterprise is also more extensive and complex.
And her picture should not be interpreted to exclude government-government
relations that are institutionalized through treaty or international organization.
It is a great time to be a lawyer, or any kind of professional in the business-business,
business-government or government-government transaction costs engineering
sector: there is more work in these areas than ever in the past, especially
in cross-border relations. But except for brief periods of retrenchment,
this has been a general historical trend.
It is in this area that cyberspace has helped us, by educating us to
the disutility of concepts of sovereignty, territoriality and extraterritoriality.
Cyberspace has demonstrated the incompleteness of our social response to
problems of jurisdiction, and has therefore made it incumbent upon us to
revise it. In part 4, I present some perspectives on revising our approach
to the problem of jurisdiction.
The delegation and derogation of functions would be expected to follow
from various efficiency, transaction costs and strategic considerations.
Superimposed on these considerations is path dependence: the observation
that the institutional framework that currently exists fits into a wider
institutional structure, and that there are transition costs that may constrain
changes that would otherwise be indicated by efficiency, transaction costs
and strategic considerations. In addition to path dependency based on pre-existing
institutional structures, path dependency may be based on game theory principles,
resulting in institutional outcomes that are inefficient even given their
institutional context.
A related reason for the durability of the state is network externalities:
because many states exist, the state may be viewed as a standard structure.
The very standardization of this structure makes its use easier; for example,
it is easier for states to relate to one another than for many different
kinds of non-state entities to relate to one another. It is for reasons
of network externalities that a standard basket of state powers--a standard
definition of sovereignty--may be useful. Therefore, it is incorrect to
examine only the particular circumstances of individual states. Rather,
in order to determine the content of contingent sovereignty in particular
circumstances, it will be necessary to examine the content of contingent
sovereignty in general. As a practical example, one might consider the
power to make treaties. If all other states have the power to enter into
treaties without referenda, the state that imposes a requirement for a
referendum may find itself left out of negotiations, or may have to make
inordinate concessions to compensate for its idiosyncrasy. Under such circumstances
the state may give up its divergent structure.
There are times when it is useful to internalize externalities, and
there are times when it is useful to constrain regulatory arbitrage.(50)
When the jurisdictional rules actually applied fail to do so in appropriate
circumstances, we can refer to a jurisdictional mismatch, or gap. This
type of jurisdictional mismatch--a mismatch between the actual governance
structures and the governance structures that would allow states to achieve
the internalization and regulatory arbitrage outcomes they desire--may
be viewed as a lag in the structural production frontier. That is, the
social institutions for allocation of jurisdiction have not changed to
reflect the technological changes brought by the rise of cyberspace. Why
have they not changed? Perhaps there are transition costs, based on path
dependence or network externalities, that form barriers to change. If so,
the failure to change may be viewed as efficient from a global perspective,
if not from a narrower perspective of the particular context. Perhaps the
value of change has simply not have been recognized. It is in this sense
that lawyers, as structural production frontier workers, may help to identify
potential revised structures that may be adopted for greater benefits.
For those, like Perritt, who believe that the internet discriminates
against totalitarian regimes, and in favor of liberal democracies, it is
necessary to show why dissemination of pornographic or nazi materials is
less a threat to the liberal democracies than dissemination of democratic
or dissenting materials is to totalitarian regimes. It is also necessary
to show that totalitarian regimes are technologically incapable of regulating
the dissemination of material they find objectionable. Far from being the
friend of free speech, the internet may be the ideal mechanism for supervision
of speech. Thus, cyberspace may hold the potential to be a diabolical tool
of totalitarian control, allowing the state finally the technological means
to keep track of what its citizens are saying, reading, buying and, through
computer analysis of large amounts of information, thinking. Thus, while
the internet may, as Perritt says, indeed be a powerful engine of open
government, it may also be a powerful vehicle of the closed society, providing
finally the technological means to attack individuals' heretofore private
lives.
It must be concluded that cyberspace, like other technologies, is a
two-edged sword, equally sharp on both sides. It both attacks and preserves
sovereignty, and it does not discriminate against totalitarians.
The lex mercatoria did arise in circumstances somewhat insulated--and
permitted by princes to be so insulated(51)--from feudal law.
And autonomous rulemaking can be a transnational solution to the problem
of separate states with separate legislative processes.(52)
We see this in the work of the International Chamber of Commerce. States
continue to facilitate this type of private ordering by enforcing choice
of law and forum clauses in private contracts.(53) Such autonomous
rulemaking can avoid barriers presented by different sovereign states that
may not be able to agree on government-provided rules that have the efficiency
or flexibility of rules that are more socially immanent. Thus, as Perritt
points out, cyberspace may serve as an ally of transnational cooperation.(54)
However, cyberspace empowers transnationalism every bit as much as it empowers
transgovernmentalism and even internationalism: the open question, which
requires further and particular analysis, is where will each be used?
Recall that there are two types of sovereignty: the zombie conclusory sovereignty and the less determinate, but living, contingent sovereignty. The difference between the two is one of institutional imagination. Conclusory sovereignty denies the plasticity of the institution of the state, while contingent sovereignty accepts it. More importantly, contingent sovereignty accepts the power and authority of people to mold the powers of the state as they see fit from time to time: it is more democratically rooted than conclusory sovereignty. Fixed institutions like conclusory sovereignty may serve purposes in circumstances of network externalities, or may persist despite their inefficiencies due to path dependence. It is important to identify these types of causes of conclusory sovereignty, in order to determine the value of its retention in particular circumstances. In this sense, contingent sovereignty may absorb and approve certain forms of conclusory sovereignty.
1. Associate Professor of International Law, The Fletcher School of Law and Diplomacy. This essay was written at the request of Dean Alfred C. Aman, Jr. of Indiana University School of Law--Bloomington, in connection with the "Symposium on the Internet and the Sovereign State: The Role and Impact of Cyberspace on National and Global Governance," as a commentary on Dean Henry Perritt's article contained elsewhere in this volume. I would like to thank Lazaros Panourgias and Amy Aiken for their able research assistance.
2. For a truly apocalyptic--but fantastic--view of the rise of cyberspace, see Poul Anderson, Harvest of Stars (1992).
3. Frances Fukuyama, The End of History and the Last Man (1992). Of course, Fukuyama only reported history's end in a very narrow sense; however the narrow claim of an end to ideological contention, while possibly true, does not indicate an end to history, but only an end to a particular dialectical struggle.
4. Marx predicted the withering away of the state with the arrival of socialism. The new medievalists make similar claims regarding the withering away of the state. This essay rejects the contention that the state, as an entity that integrates a number of governmental functions in a territorially-based structure, is soon for the junk-heap of history. However, this essay also describes the contingency of the powers and governance structures of states. Finally, it is worth noting that the new medievalists dovetail with the legal scholars who hold out the lex mercatoria as a model for cyberspace law.
5. See Jessica Mathews, Power Shift, Foreign Affairs January-February 1997.
6. We must recognize that each particular state will be affected differently; however, this essay is too brief and lacking in empiricism to engage in a particular or comparative analysis. For a discussion of the relation between reality and theory in this context, see J.H.H. Weiler & Joel P. Trachtman, Constitutionalism and its Discontents, 17 Nw. J. Int'l L. & Bus. 354 (1997).
7. Henry H. Perritt, The Internet as a Threat to Sovereignty? Thoughts on the Internet's Role in Strengthening National and Global Governance, __ Indiana J. Global L. Studies __ (1998).
8. Guido Calabresi, The Pointlessness of Pareto: Carrying Coase Further, 100 Yale L. J. 1211 (1991). See also Douglass C. North, A Framework for Analyzing the State in Economic History, Explorations in Economic History 249 (July 1979).
9. Louis Henkin, The Mythology of Sovereignty, Newsletter of the American Society of International Law, March-May 1993, at 1, 6-7.
10. Here, I simply concur with Peritt's observation that the "problem is not . . . with the Internet but with the realist perspective." Perritt, supra note 6, at 4. However, as will become apparent below, I think that the liberal model that Perritt argues should replace the realist model has some problems of its own. In short, I am not convinced that liberalism supports an argument either for or against contingent sovereignty. Furthermore, Perritt's argument seems to be that sovereignty is capable of preservation, and worth preserving, by use of cyberspace technologies.
11. However, even rational discourse must take account of the irrational in us all. See Weiler & Trachtman, supra note 5, at 380-85. "According to the multiple demos [peoples] concept suggested [therein], there is a recognition of both the force and the potential value in the survival of the traditional European nation-state imbued with the force of national identification, cultural differentiation, a vision in which the Tower of Babel dispersal was not a punishment but a blessing. The Eros of nationalism is, thus, recognized and approved." Id. At 383.
12. See Roberto Mangabeira Unger, What Should Legal Analysis Become? (1996).
13. I suggest below that the development of cyberspace may empower both the market and the state, and therefore, further analysis is required in order to determine which is empowered more in particular instances.
14. James M. Buchanan, Explorations Into Constitutional Economics 24-25 (1989).
15. Walter B. Wriston, Bits, Bytes and Diplomacy, Foreign Affairs, September-October 1997, at 172.
16. Perritt, supra note 6, at 21.
17. Joel R. Reidenberg, Governing Networks and Rule-Making in Cyberspace, in Borders in Cyberspace: Information Policy and the Global Information Infrastructure at 98 (Brian Kahin & Charles Nesson, eds. 1997).
18. On the issue of formal rules versus standards, see Isaac Ehrlich & Richard A. Posner, An Economic Analysis of Legal Rulemaking, 3 J. Legal Stud. 257 (1974); Colin S. Diver, The Optimal Precision of Administrative Rules, 93 Yale L. J. 65 (1983); Kathleen Sullivan, The Supreme Court, 1991 Term - Foreword: The Justices of Rules and Standards, 106 Harv. L. Rev. 24 (1992); Louis Kaplow, Rules Versus Standards: An Economic Analysis, 42 Duke L. J. 557 (1992); Gillian K. Hadfield, Weighing the Value of Vagueness: An Economic Perspective on Precision in the Law, 82 Cal. L. Rev. 541 (1994); Ronald A. Cass, Judging: Norms and Incentives of Retrospective Decision-making, 75 B.U.L. Rev. 941 (1995).
19. See The Schooner Exchange v. McFaddon, 11 U.S. (7 Cranch) 116 (1812).
20. See Walter Wheeler Cook, The Logical and Legal Bases of the Conflict of Laws (1949).
21. See, e.g., Joel P. Trachtman, Conflict of Laws and Accuracy in the Allocation of Government Responsibility, 26 Vand J. Transnat'l L. 1 (1994).
22. Restatement (Third) of Foreign Relations Law 403 (1987).
23. See Joel P. Trachtman, Reflections on the Nature of the State: Sovereignty, Power and Responsibility, 20 Canada-United States Law Journal 399 (1994).
24. David R. Johnson & David G. Post, Law and Borders: The Rise of Law in Cyberspace, 48 Stan. L. Rev. 1367 (1996), reprinted in Borders in Cyberspace: Information Policy and the Global Information Infrastructure (Brian Kahin & Charles Nesson, eds. 1997). See also Lawrence Lessig, The Constitution of Code: Limitations on Choice-Based Critiques of Cyberspace Regulation, 5 Commlaw Conspectus 181, 184 n.23 (1997). "In cyberspace, because code is so plastic and so powerful, and because law is so feeble and (on an international scale) so rigid, code has a comparative regulatory advantage over law. A gap in legal regulation will therefore emerge, and code will fill that gap." Id. at 184. Accord, Joel Reidenburg, Governing Networks And Rule-making in Cyberspace, 45 Emory L.J. 911 (1996). For a different view, and one that argues the technical feasibility of regulation in cyberspace, see Timothy S. Wu, Note: Cyberspace Sovereignty? -- The Internet And The International System, 10 Harv. J. Law & Tech. 647 (1997).
25. On the other hand, effects are more dispersed today than they have been in the past, and cyberspace is an instrument of dispersion of effects.
26. See Johnson & Post, supra note 23, Henry H. Perritt, Jurisdiction in Cyberspace, 41 Vill. L. Rev. 1 (1996); Dan L. Burk, Federalism in Cyberspace, 28 Conn. L. Rev. 1095 (1996).
27. For a description of the technical aspects of the internet, see ACLU v. Reno, 929 F. Supp. 824, 830 (E.D. Pa. 1996), aff'd, 117 S. Ct. 2329 (1997).
28. For an exposition of this argument, and a suggestion that spontaneous, or at least private, ordering will arise, see Johnson & Post, supra note 23.
29. Johnson & Post, supra note 23.
30. Ronald Coase, the Firm, the Market and the Law 95-185 (1988), incorporating and commenting upon earlier work, including Coase's seminal articles: The Nature of the Firm, 4 Economica 386 (1937) and The Problem of Social Cost, 3 J.L. & Econ. 1 (1960). See also Ronald Coase, The Nature of the Firm: Influence, 4 J.L. Econ. & Organization 33, 33 (1988).
31. I explored this use in The Theory of the Firm and the Theory of the International Economic Organization: Toward Comparative Institutional Analysis, 17 Nw. J Int'l L. & Bus. 470 (1997).
32. See, e.g., Neil Komesar, Imperfect Alternatives (1994).
33. See Oliver E. Williamson, The Economic Institutions of Capitalism 22 (1985)
34. Robert D. Cooter, The Best Right Laws: Value Foundations Of the Economic Analysis of Law, 64 Notre Dame L. Rev. 817, 822 (1989).
35. See I. Trotter Hardy, The Proper Legal Regime for "Cyberspace," 55 U. Pitt. L. Rev. 993 (1994).
36. See, e.g., Perritt, supra note 6, at 7. The counterexamples, given by Perritt at 8, are China and Singapore.
37. For an explanation of why it is currently difficult for governments to regulate content, see A. Michael Froomkin, The Internet as a Source of Regulatory Arbitrage, in Borders in Cyberspace: Information Policy and the Global Information Infrastructure (Brian Kahin & Charles Nesson, eds. 1997).
38. Richard Musgrave defined public goods by reference to the characteristics of non-excludibility and non-rivalry. Richard Musgrave, The Theory of Public Finance (1959). Perritt discusses this issue in detail in Henry H. Perritt, Jr., Property and Innovation in the Global Information Infrastructure, 1996 U. Chi. Legal F. 261 (1996).
39. However, it seems premature to herald the end of intellectual property. Consistently with the main argument of this essay, it may be said that the same technologies that challenge the protection of intellectual property rights provide the tools for enhancing protection.
40. See David Osborne & Ted Gaebler, Reinventing Government (1992).
41. For an extended analysis of this formulation, see Joel P. Trachtman, The Theory of the Firm and the Theory of the International Economic Organization, 17 Nw. J. Int'l L. & Bus. 470 (1997).
42. Komesar, supra note 31.
43. Of course, another, opposite, dark side of cyberspace is its potential for state intrusion in the sphere of the individual, toward totalitarianism.
44. On the effect of cyberspace on securities regulation, see John C. Coffee, Brave New World?: The Impact of the Internet on Modern Securities Regulation, 52 Bus. Law. 1195 (1997).
45. Perhaps unlike a single telephone call, the internet involves retrieval of data on a "giant network which interconnects innumerable smaller groups of linked computer networks." ACLU v. Reno, 929 F. Supp. 824, 830 (E.D. Pa. 1996), aff'd, 117 S. Ct. 2329 (1997). Thus, there are significant factual differences, but the jurisdictional crux of the matter is that the internet serves, like the telephone network, as an instrument of cross-border transmission of information.
46. The best statement of the rationale for the effects test is articulated by Judge Wilkey in the Laker case: "Certainly the doctrine of territorial sovereignty is not such an artificial limit on the vindication of legitimate sovereign interests that the injured state confronts the wrong side of a one-way glass, powerless to counteract harmful effects originating outside its boundaries which easily pierce its "sovereign" walls, while its own regulatory efforts are reflected back in its face.(47)
47. Laker Airways Ltd. v. Sabena, Belgian World Airlines, 731 F.2d 909, 923 (D.C. Cir. 1984).
48. Thus, it seems beside the point to say that "the Internet network . . . is beyond the jurisdictional reach of any centralized political or legal authority . . . ." Coffee, supra note 43, at 1201 (citations omitted). Of course, the entire network is not encompassed within any single state's power, just as the entire worldwide telephone, or book publishing, network is not so encompassed. However, this assertion hides the real complexity of the question of how jurisdiction is indeed allocated today, and how the allocation might be changed in response to the rise of cyberspace.
49. See Joel P. Trachtman, Conflict of Laws and Accuracy in the Allocation of Government Responsibility, 5 Vand. J. Transnat'l L. 975 (1994). See also Joel P. Trachtman, Externalities and Extraterritoriality: The Law and Economics of Prescriptive Jurisdiction, forthcoming in Comparative Aspects of International Law (Alan Sykes and Jagdeep Bhandari, eds., 1997).
50. See Trachtman, supra note 10 (exploring these phenomena as reasons states may cooperate in international economic affairs).
51. See Wyndham A. Bewes, the Romance of the Law Merchant 15-25 (1923).
52. See David G. Post, Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace, 1995 J. Online L. art. 3, par. 7-8, available at http://www.law.cornell.edu/jol/jol.table.html.
53. There is a consistent pattern of U.S. Supreme Court precedent creating a special space for international commerce, in which private persons have greater choice of legal regimes. See, e.g., Mitsubishi Motors v. Soler Chrysler-Plymouth, 473 U.S. 614 (1985) (choice of arbitration and choice of law) Bremen v. Zapata Offshore Co., 407 U.S. 1 (1972) (choice of court forum).
54. Perritt, supra note 2, at 19.